The topic discussed in this chapter are: We will explore the need, features and characteristics of public key cryptography; the working/function of a public key cryptography scheme will be discussed in detail; RSA, as an example, will be explained. | Lecture Network security Chapter 17 - Dr. Munam Ali Shah